Abstract
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK. SKINNY can be implemented efficiently in both soft- and hardware and supports block sizes of 64 and 128 bits as well as tweakey sizes of 64, 128, 192 and 128, 256, 384 bits respectively. This paper presents a related-tweakey impossible-differential attack on up to 23 (out of 36) rounds of SKINNY-64/128 for different tweak sizes. All our attacks can be trivially extended to SKINNY-128/128.
Original language | English |
---|---|
Title of host publication | Applied Cryptography and Network Security |
Place of Publication | Cham |
Pages | 208-228 |
ISBN (Electronic) | 978-3-319-61204-1 |
DOIs | |
Publication status | Published - 2017 |
Event | 15th International Conference on Applied Cryptography and Network Security: ACNS 2017 - Kanazawa, Japan Duration: 10 Jul 2017 → 12 Jul 2017 Conference number: 15 |
Publication series
Name | Lecture Notes in Computer Science |
---|---|
Volume | 10355 |
Conference
Conference | 15th International Conference on Applied Cryptography and Network Security |
---|---|
Abbreviated title | ACNS |
Country/Territory | Japan |
City | Kanazawa |
Period | 10/07/17 → 12/07/17 |